-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability requires two key runtime behaviors: 1) Processing of attacker-controlled data from ML job indices, and 2) Output generation without proper escaping. The identified functions are core components of Elasticsearch's ML results pipeline:
While exact patch details are unavailable, the CVE description explicitly ties the vulnerability to ML job result viewing. These functions represent the most probable locations where unescaped data would flow from document storage to HTTP responses in affected versions. Confidence is medium due to reliance on architectural patterns rather than explicit patch analysis.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.elasticsearch:elasticsearch | maven | < 5.6.9 | 5.6.9 |
| org.elasticsearch:elasticsearch | maven | >= 6.0.0, < 6.2.4 | 6.2.4 |